Data Security

Understanding Modern Data Architecture

Miller Trujillo

Senior Software Engineer

Risks and consequences

Data Breach

  • Unauthorized access
  • Violates data confidentiality

A broken lock symbolizing a data breach

Impact

  • Financial: Fraud, penalties
  • Reputation: Reduced trust, customer loss

A downward arrow with money, representing financial loss, and a damaged shield representing reputation loss

Understanding Modern Data Architecture

Data protection measures

Access Control

  • "Door to your data house"
  • Defines who accesses what data

Encryption

  • "Secret letter"
  • Protects data at rest and in transit

Data Masking

  • Uses data without revealing sensitive parts
Understanding Modern Data Architecture

Strengthening security in the cloud

IAM

  • Permissions, role-based access
  • Free to use

IAM cloud services

KMS

  • Safe for cryptographic keys
  • Handles key creation, rotation, deletion
  • Customer managed key

KMS cloud services

Understanding Modern Data Architecture

Strengthening security in the cloud: The network

Firewalls, private networks

VPC (Virtual Private Cloud)

  • Virtual, private, secure, isolated network within the cloud

VPC cloud services

VPC Service Controls

  • Additional security measures
  • Limit access based on the context
  • More effort and cost to setup proper networking
Understanding Modern Data Architecture

Let's practice!

Understanding Modern Data Architecture

Preparing Video For Download...